RECON 2008 Conference Videos
Video Item Preview
Share or Embed This Item
- Publication date
- 2008
- Topics
- Recon, Reverse Engineering, Conference, Montreal, Security
- Publisher
- recon.cx
- Item Size
- 8.8G
RECON2008 T02 Bruce Dang Methods for analyzing malicious Office documents.avi
RECON2008 T03 Ilfak Guilfanov Building plugins for IDA Pro.avi
RECON2008 T04 Thomas Garnier Windows privilege escalation through LPC and ALPC interfaces.avi
RECON2008 T05 Nicolas Pouvesle NetWare kernel stack overflow exploitation.avi
RECON2008 T06 Cameron Hotchkies Under the iHood.avi
RECON2008 T07 Jason Raber Helikaon Linux Debuger.avi
RECON2008 T08 Craig Smith Creating Code Obfuscation Virtual Machines.avi
RECON2008 T09 Eric D Laspe The Deobfuscator.avi
RECON2008 T10 Nicolas Brulez Polymorphic Virus Analysis.avi
RECON2008 T11 Michael Strangelove Hacking Culture.avi
RECON2008 T12 Anthony de Almeida Lopes Bypassing Security Protections by Backdooring libc.avi
RECON2008 T13 Alexander Sotirov Blackbox Reversing Of XSS Filters.avi
RECON2008 T14 Aaron Portnoy and Ali Rizvi Santiago Reverse Engineering Dynamic Languages a Focus on Python.avi
RECON2008 T15 Sharon Conheady and Alex Bayly Social Engineering for the Socially Inept.avi
RECON2008 T16 Pablo Sole RE over Adobe Acrobat Reader using Immunity Debugger.avi
RECON2008 T17 Gera Two very small reverse engineering tools.avi
RECON2008 T18 Tiller Beauchamp RE Trace Applied Reverse Engineering on OS X.avi
RECON2008 T19 Sebastien Doucet 64 bit Imports Rebuilding and Unpacking Part1.avi
RECON2008 T19 Sebastien Doucet 64 bit Imports Rebuilding and Unpacking Part2.avi
Segments
RECON2008 T01 Pierre Marc Bureau How I learned Reverse Engineering with Storm.avi
RECON2008 T02 Bruce Dang Methods for analyzing malicious Office documents.avi
RECON2008 T03 Ilfak Guilfanov Building plugins for IDA Pro.avi
RECON2008 T04 Thomas Garnier Windows privilege escalation through LPC and ALPC interfaces.avi
RECON2008 T05 Nicolas Pouvesle NetWare kernel stack overflow exploitation.avi
RECON2008 T06 Cameron Hotchkies Under the iHood.avi
RECON2008 T07 Jason Raber Helikaon Linux Debuger.avi
RECON2008 T08 Craig Smith Creating Code Obfuscation Virtual Machines.avi
RECON2008 T09 Eric D Laspe The Deobfuscator.avi
RECON2008 T10 Nicolas Brulez Polymorphic Virus Analysis.avi
RECON2008 T11 Michael Strangelove Hacking Culture.avi
RECON2008 T12 Anthony de Almeida Lopes Bypassing Security Protections by Backdooring libc.avi
RECON2008 T13 Alexander Sotirov Blackbox Reversing Of XSS Filters.avi
RECON2008 T14 Aaron Portnoy and Ali Rizvi Santiago Reverse Engineering Dynamic Languages a Focus on Python.avi
RECON2008 T15 Sharon Conheady and Alex Bayly Social Engineering for the Socially Inept.avi
RECON2008 T16 Pablo Sole RE over Adobe Acrobat Reader using Immunity Debugger.avi
RECON2008 T17 Gera Two very small reverse engineering tools.avi
RECON2008 T18 Tiller Beauchamp RE Trace Applied Reverse Engineering on OS X.avi
RECON2008 T19 Sebastien Doucet 64 bit Imports Rebuilding and Unpacking Part1.avi
RECON2008 T19 Sebastien Doucet 64 bit Imports Rebuilding and Unpacking Part2.avi
- Contact Information
- http://recon.cx
comment
Reviews
Subject: My favourite
14,580 Views
2 Favorites
DOWNLOAD OPTIONS
IN COLLECTIONS
Unsorted Hacker Convention Talks Hacker ConferencesUploaded by hfortier on